WO2004002113A1 - Methods and systems to determine whether a wireless device is within a geographical area - Google Patents

Methods and systems to determine whether a wireless device is within a geographical area Download PDF

Info

Publication number
WO2004002113A1
WO2004002113A1 PCT/US2003/019095 US0319095W WO2004002113A1 WO 2004002113 A1 WO2004002113 A1 WO 2004002113A1 US 0319095 W US0319095 W US 0319095W WO 2004002113 A1 WO2004002113 A1 WO 2004002113A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
node
location
access point
receiving
Prior art date
Application number
PCT/US2003/019095
Other languages
French (fr)
Inventor
Stephen Wood
Christopher Rogers
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to AU2003247540A priority Critical patent/AU2003247540A1/en
Priority to EP03761092A priority patent/EP1535447A1/en
Publication of WO2004002113A1 publication Critical patent/WO2004002113A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • Wireless networks allow computers to connect to the network without being tethered by wires. This allows users to freely move about without being disconnected from the network.
  • wireless networks are more vulnerable to intruders. This is because intruders (commonly referred to as "hackers"), don't need to be physically located next to a wall plug or network jack to attempt to break into a wireless network. .
  • hackers commonly referred to as "hackers”
  • Figure 1 shows a diagram of a wireless network
  • Figure 2 shows a diagram of a wireless network with logical boundaries
  • Figure 3 shows a diagram of a network access point device
  • Figure 4 shows a diagram of a network server
  • Figure 5 shows data structures suitable for use in an embodiment of the present invention.
  • FIGS 6 and 7 show flowcharts in accordance with various embodiments of the present invention.
  • FIG. 1 shows a diagram of a wireless network.
  • Network 100 includes server 122, network access points (NAPs) 102, 104, and 106, and wireless network node 120.
  • Access points 102, 104, and 106 are coupled to server 122 by media 116, and one or more hail of access points 102, 104, and 106 are coupled to node 120 by wireless links 132, 134, and 136.
  • the combination of access points 102, 104, and 106, and server 122 provide network ⁇ services to network node 120.
  • node 120 may, in some embodiments, provide network services to other nodes (not shown), or to any of access points 102, 104, and 106.
  • Wireless network 100 may be any type of network that allows a node to access network services using a wireless link.
  • wireless network 100 represents a cellular telephone network, and in other embodiments, wireless network 100 represents a wireless local area network (WLAN) or wireless wide area network (WWAN).
  • network 100 is a hybrid system that provides a combination of different services to network nodes and access points.
  • Media 116 may be any type of signal transmission media capable of providing a data communication path between server 122 and access points 102, 104, and 106. Examples include, but are not limited to: wires, fiber optic cables, and wireless links.
  • Wireless network node 120 may be any type of network node capable of accessing network services using a wireless link.
  • node 120 may be a cellular telephone, a computer, a personal digital assistant (PDA), or any other type of device that may access a network using a wireless link.
  • node 120 may be a combination cellular phone and computer that provides both wireless data and voice services.
  • node 120 maybe an asset tag that is attached to, or otherwise associated with, an asset that is tracked by network 100.
  • nodes and access points are network elements that may provide network services, receive network services, or both.
  • access points 102, 104, and 106 may be cellular base stations that provide network services and node 120 may be a cellular telephone that primarily receives network services.
  • access points 102, 104, and 106, and node 120 may be computers that provide and receive network services.
  • the remainder of this description describes many different embodiments of the present invention, with an emphasis on wireless LAN embodiments.
  • the emphasis on wireless LAN embodiments is provided for clarity, and one of ordinary skill in the art will understand that embodiments of the present invention are not limited to wireless LANs.
  • network 100 provides the ability to determine the location of wireless network nodes. Throughout this description, this ability is referred to as “location determination.” Networks that provide location determination are referred to herein as “location-aware” networks. Network 100 is a location-aware network that provides location determination of node 120 through the use of wireless links 132, 134, and 136.
  • Wireless links 132, 134, and 136 provide communication paths between node 120 and access points 102, 104, and 106.
  • the various access points send and receive wireless signals to and from node 120 on the wireless links, and also send and receive signals to and from server 122 using media 116.
  • wireless links 132, 134, and 136 utilize a pulse-based radio frequency (RF) protocol to provide communications between node 120 and access points 102, 104, and 106.
  • RF radio frequency
  • short RF pulses are transmitted by node 120 and received by access points 102, 104, and 106.
  • the wireless links utilize baseband modulated protocols in which the desired data to be transmitted is superimposed by various means on a sinusoidal carrier signal.
  • wireless links 132, 134, and 136 utilize a data modulated sinusoidal carrier. Any type of wireless protocol may be utilized for wireless links 132, 134, and 136.
  • the signals may contain voice information or data information, in any analog or digital format suitable for requesting or providing network services.
  • the various access points may also gather information describing attributes of the wireless signals. For example, in pulse- based embodiments, the access points may gather pulse time-of-arrival information as well as angle-of-arrival, pulse amplitude, pulse duration, and rise/fall time information. In sinusoidal carrier embodiments, the access points may gather center frequency, angle-of- arrival, amplitude, phase offset, or other information.
  • information gathered describing attributes of the received signals may include any type of information, including information suitable to support location determination.
  • pulse time- of-arrival information may be used to determine the location of network node 120 relative to the locations of the access points.
  • phase offset of a received sinusoidal carrier signal may also be used in support of location determination.
  • Attributes of received wireless signals may be transmitted from the various access . points to server 122. These attributes may then be used by server 122 to determine the location of node 120. For example, in pulse-based embodiments, pulse time-of-arrival ⁇ and optionally pulse angle-of-arrival information gathered by the access points may be used to resolve the position of node 120 relative to the locations of the access points that measure the time-of-arrival and optionally angle-of-arrival. Also for example, in sinusoidal carrier embodiments, phase offsets may be used to resolve the location of node 120.
  • Figure 1 shows three access points. In embodiments with three access points capable of receiving signals from node 120, the location of node 120 may be determined in two dimensions. Some embodiments have more than three access points. In embodiments with four or more access points capable of receiving signals from node 120, the location of node 120 may be determined in three dimensions.
  • FIG. 2 shows a diagram of a wireless network with logical boundaries.
  • Wireless network 200 includes network access points (NAPs) 202, 203, 204, 205, 206, 207, 208, and 209, sometimes referred to herein as NAPs 202-209.
  • NAPs 202-209 are coupled to a server (not shown) such as server 122 ( Figure 1).
  • Node 240 is a network node that connects to the network by communicating with one or more of NAPs 202-209. This connection is established when the network node "associates" with a given access point through which it intends to pass data to the rest of the network.
  • network nodes typically perform an "authentication" action prior to association.
  • An authenticated node is a node that is allowed to connect to the network and receive network services.
  • Network node 240 communicates with network access points using wireless signals. For example, network node 240 communicates with network access points 202, 204, and 208 using wireless signals on wireless links 242, 244, and 246, respectively. In some embodiments, network node 240 communicates with the network using only one of the wireless links shown, but multiple network access points receive the signals transmitted by network node 240. The location of node 240 is determined by wireless network 200 as described above with reference to Figure 1.
  • Logical boundary 220 may correspond to the outline of a building, but this is not necessary.
  • logical boundary 220 may correspond to an area within a single building, an area encompassing multiple buildings, or an area outside of any buildings.
  • Figure 2 shows a single logical network boundary, but this is not a limitation.
  • multiple logical network boundaries exist. They may overlap such that there is an intersecting area, or they may not overlap such that there are multiple discrete areas from which a network node may connect to the network.
  • network node 240 When network node 240 attempts to connect to network 200, network node 240 sends a location-based network authentication request to one of network access points 202, 204, and 208. The network access points receiving the authentication request forward the request to a server. Network 200 determines the location of network node 240, and authenticates the node based on its location relative to logical boundary 220. hi the case of network node 240, network 200 determines that the node is within logical boundary 220, and the location-based authentication request is granted.
  • Network node 250 is outside logical boundary 220.
  • network node 250 sends a location-based network authentication request to network access point 208 using a wireless signal on wireless link 252.
  • the wireless signal is also received by network access points 207 and 209 on wireless links 254 and 246, respectively.
  • the network determines the location of network node 250, and determines that network node 250 is outside logical boundary 220. Based on the location of network node 250, the location-based authentication request is denied and network node 250 is not granted access to network 200.
  • Location-based authentication is an example of a "link-layer” network authentication scheme. Some embodiments possess additional link-layer authentication schemes, such as "open system” and "shared key” authentication. Open system authentication is a null scheme that authenticates all traffic at the link-layer. Shared key authentication is another example of a link-layer authentication scheme wherein an authorized node shares a common secret key code with the network.
  • Some embodiments of the network utilize other authentication schemes beyond . link-layer authentication.
  • Examples of other authentication schemes include operating system (OS) level authentication as provided by network operating systems that maintain " individual user level and/or system resource level passwords.
  • OS operating system
  • Tracked asset 232 includes asset tag 233 associated therewith.
  • Asset tag 233 includes a transmitter compatible with the network access points shown in Figure 2.
  • asset tag 233 includes a transmitter that transmits pulses that are received by three or more of NAPs 202-209. The time-of-arrival and optionally angle-of-arrival of the pulses is determined by the network access points, and the network server (not shown) may determine the location of tracked asset 232.
  • Logical boundary 230 is a boundary against which the location of tracked asset 232 is compared.
  • logical boundary 230 may correspond to a laboratory, the outline of a retail store, or an intensive care unit in a hospital within which certain tracked assets are kept.
  • network 200 may take appropriate action, such as raising an alert readable by security personnel.
  • Logical boundary 230 may correspond to a physical boundary, such as a building, a room within a building, or a courtyard on a campus, but this is not necessary.
  • Figure 2 shows one logical asset boundary 230.
  • FIG 3 shows a diagram of a network access point device suitable for use at the network access points shown in Figures 1 and 2.
  • Network access point device 300 includes transmitter 302, receiver 304, time-of-arrival detector 306, angle-of-arrival detector 214, processor 308, memory 312, and transceiver 310.
  • Transceiver 310 communicates with a server (not shown) using media 116.
  • Transceiver 310 also communicates with processor 308.
  • Transmitter 302 and receiver 304 both communicate with processor 308 and antenna 320.
  • Antenna 320 receives wireless signals from network nodes and asset tags on wireless link 330.
  • wireless signals on wireless link 330 include electromagnetic pulses as described above with reference to Figure 1.
  • receiver 304 receives the pulses
  • time-of-arrival detector 306 detects the . arrival time of the pulse.
  • Time-of-arrival information is one of many possible attributes of a wireless signal that may be measured by receiver 304.
  • angle-of-arrival detector 314 detects the angle from which the pulse arrived as an attribute of the wireless signal. Some embodiments measure both time-of-arrival and angle-of-arrival.
  • Processor 308 receives information describing the wireless signal from receiver 304 and provides it to a network server using transceiver 310.
  • Time-of-arrival detector 306 can be implemented in a number of different ways. In one embodiment, the function of the time-of-arrival detector is a separate module within the network access point device 300. In other embodiments, time-of-arrival detector 306 is integrated into receiver 304. In yet other embodiments, time-of-arrival detector 306 utilizes processing capabilities of processor 308 to perform its function. Angle-of-arrival detector314 can also be implemented in a number of different ways. In some embodiments, angle-of-arrival detector 314 is a circuit that receives signals from a phased-array antennal to measure the angle from which the signals are received. In these embodiments, antenna 320 represents a phased-array antenna. Many other mechanisms can be used to measure the angle-of-arrival of the wireless signal.
  • Processor 308 may be any type of processor suitable to perform actions to support the operation of network access point device 300.
  • processor 308 may be a microprocessor, a microcontroller, or the like.
  • processor 308 may be a hardware controller or a collection of hardware controllers that perform specific tasks.
  • Memory 312 represents an article that includes a machine-accessible medium.
  • memory 312 may represent any one or more of the following: a hard disk, a floppy disk, random access memory (RAM), read only memory (ROM), flash memory, CDROM, or any other type of article that includes a medium readable by a machine.
  • Memory 312 may store instructions for performing the execution of the various method embodiments of the present invention.
  • Memory 312 may also include data describing the current state of network access point device 300 and the entire network.
  • a network server may utilize this information to resolve the location of the network node from which the pulse originated.
  • multiple electromagnetic pulses are received by receiver 304.
  • the multiple electromagnetic pulses may represent any type of communication from a network node.
  • a group of pulses may represent a network authentication request from a network node.
  • a group of pulses may represent an identification number or serial number from an asset tag.
  • Receiver 304 derives information from groups of pulses, as well as from " attributes describing the pulses.
  • Processor 308 receives from receiver 304 information describing both groups of pulses as well as attributes of individual pulses. For example, processor 308 may receive an authentication request from receiver 304, as well as receiving time-of-arrival and angle-of-arrival information of pulses contained within the authentication request.
  • FIG 4 shows a diagram of a network server suitable for use in a wireless network such as network 100 ( Figure 1) or network 200 ( Figure 2).
  • Server 400 includes processor 402, memory 404, and transceiver 406.
  • Transceiver 406 is coupled to media 116 at port 410.
  • media 116 couples the network server with any number of network access point devices such as network access point device 300 ( Figure 3).
  • Transceiver 406 receives information from network access point devices on media 116.
  • wireless signal attributes are received from multiple network access point devices, and processor 402 determines the location of a transmitter from which the wireless signals originated.
  • Server 400 may be a personal computer (PC), server, mainframe, handheld device, portable computer, or any other system that may perform the operations described herein.
  • Memory 404 represents an article that includes a machine-accessible medium.
  • memory 404 may represent any one or more of the following: a hard disk, a floppy disk, random access memory (RAM), read only memory (ROM), flash memory, CDROM, or any other type of article that includes a medium readable by a machine.
  • Memory 404 may store instructions for performing the execution of the various method embodiments of the present invention.
  • Memory 404 may also include data describing the current state of server 400 and the entire network.
  • memory 404 may include data describing logical boundaries, as well as the location of network nodes and asset tags. One possible set of data is shown in Figure 5.
  • Figure 5 shows data structures suitable for use in various embodiments of the present invention.
  • Data structure 500 includes logical boundary database 510 and asset database 520.
  • Logical boundary database 510 includes data 502 describing one or more logical network boundaries, and data 504 describing one or more logical asset boundaries.
  • Data 502 describe a logical network boundary such as logical network boundary 220 ( Figure 2).
  • the logical network boundary may be described by data 502 in any of many . formats. For example, a series of line segments may be specified by end points, or vectors may be described by end points and direction.
  • data 504 may describe logical " asset boundaries in any suitable format.
  • data 504 may include end points, vectors, or any shape.
  • Asset database 520 includes records describing asset tags and tracked assets. For example, an asset tag serial number may be maintained along with attributes of the tracked asset and the logical asset boundary to which the asset is assigned.
  • the attributes may include any information that is useful. For example, in embodiments that track assets in a retail store environment, the attributes may include price and description data. Also for example, in embodiments that track assets in a laboratory, the attributes may include a description of the tracked asset and the identification of a person to be notified in the event that the asset leaves the logical asset boundary.
  • a network server may track a location of an asset having a serial number, and compare the location of the asset with the logical asset boundary specified in the asset database. For example, an asset tag may transmit a unique serial number that is received by at least one network access point device and sent to the server. The server may retrieve one or more appropriate records from the asset database using the serial number of the tracked asset. The location of the tracked asset may be compared against the logical asset boundary specified in the asset database. If the tracked asset is outside the boundary, an alert may be raised. As used herein, the term "raise an alert" refers to any appropriate action to be taken.
  • raising an alert may include sending an email message to a responsible party, hi other embodiments, raising an alert may include sounding a siren and turning on a flashing red light.
  • the specific course of action to be taken when an alert is raised may be predefined or may also be dependent upon information stored in the attributes field of the appropriate asset database record.
  • data structure 500 includes data in support of logical asset boundaries and logical network boundaries. Some embodiments include only logical asset boundaries, and other embodiments include only logical network boundaries.
  • the network is installed in an environment without tracked assets. In these embodiments, logical asset boundaries do not necessarily exist. In other embodiments, the network is installed in an environment that does not include network nodes, but does include tracked assets, h these embodiments, logical network boundaries . do not necessarily exist.
  • Figures 6 and 7 show flowcharts in accordance with various embodiments of the ' present invention.
  • methods 600 and 700 are performed by a server such as server 400 ( Figure 4).
  • the methods are distributed across a server and network access point devices.
  • the various actions in methods 600 and 700 may be performed in the order presented, or may be performed in a different order.
  • a wireless signal comprising a series of electromagnetic pulses is received from a node.
  • the node corresponds to a network node, such as those shown in the previous figures, that is attempting to access the network.
  • the network node may be attempting to authenticate to the network using a single network access point, but the wireless signal may be received by multiple network access points devices.
  • a network authentication request is received from the node.
  • the network authentication request is received by a single network access point device and forwarded to a network server.
  • the network authentication request is received by multiple network access point devices, all of which forward the request to the network server.
  • Figures 6 and 7 refers to the use of time-of-arrival information.
  • time-of-arrival is equally applicable to "angle-of-arrival" information.
  • angle-of-arrival information may also be transmitted.
  • time-of-arrival information is used to resolve the location of a node
  • angle-of-arrival information may also be used to resolve the location of a node.
  • time-of-arrival information is received from a plurality of network access points.
  • the time-of-arrival information received may describe multiple electromagnetic pulses from the network node, or may describe a single electromagnetic pulse.
  • the location of the node is resolved from the time-of-arrival information.
  • a determination is made whether the location of the node satisfies a criteria. This may correspond to any location-based criteria. For example, the criteria may include one or more logical network boundaries.
  • authentication is provided if the location of the node satisfies the criteria.
  • Figure 7 shows a flowchart of a method for operating a network that includes - location-based authentication and tracked assets.
  • time-of-arrival information is received from a plurality of network access points.
  • the time-of-arrival information describes a pulse-based wireless signal originating from the node.
  • a network authentication request originating from the node is received.
  • a determination is made whether the node is within a logical network boundary, and at 740, authentication is refused if the node is not within the logical network boundary.
  • time-of-arrival information is received from a plurality of network access points. This time-of-arrival information describes a pulse-based wireless signal originating from an asset tag.
  • a determination is made whether the asset tag is within a logical asset boundary. This may include accessing a database such as database 500 ( Figure 5).
  • an alert is raised if the asset tag is not within the logical asset boundary.

Abstract

A network may determine the location of network nodes and tracked assets and make location-based decisions. In one embodiment, authorisation of a network node is performed only if the network node is within a certain geographical area. In another embodiment, an alarm is generated if a tracked asset moves outside of a predetermined geographical area.

Description

METHODS AND SYSTEMS TO DETERMINE WHETHER A WIRELESS DEVICE IS WITHIN A GEOGRAPHICAL AREA
Background
Wireless networks allow computers to connect to the network without being tethered by wires. This allows users to freely move about without being disconnected from the network. In addition to the freedoms afforded users, wireless networks are more vulnerable to intruders. This is because intruders (commonly referred to as "hackers"), don't need to be physically located next to a wall plug or network jack to attempt to break into a wireless network. . For the reasons stated above, and for other reasons stated below which will become apparent to those skilled in the art upon reading and understanding the present specification, there is a need in the art for alternate methods and apparatus for wireless networks.
Brief Description of the Drawings
Figure 1 shows a diagram of a wireless network;
Figure 2 shows a diagram of a wireless network with logical boundaries;
Figure 3 shows a diagram of a network access point device;
Figure 4 shows a diagram of a network server; Figure 5 shows data structures suitable for use in an embodiment of the present invention; and
Figures 6 and 7 show flowcharts in accordance with various embodiments of the present invention.
Description of Embodiments
In the following detailed description, reference is made to the accompanying drawings that show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure, or characteristic described herein in connection with one embodiment may be implemented within other embodiments without departing from the spirit and scope of the invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims, appropriately interpreted, along with the full range of equivalents to which the claims are entitled. In the drawings, like numerals refer to the same or similar functionality throughout the several views.
Figure 1 shows a diagram of a wireless network. Network 100 includes server 122, network access points (NAPs) 102, 104, and 106, and wireless network node 120. Access points 102, 104, and 106 are coupled to server 122 by media 116, and one or more „ of access points 102, 104, and 106 are coupled to node 120 by wireless links 132, 134, and 136. The combination of access points 102, 104, and 106, and server 122 provide network services to network node 120. In addition, node 120 may, in some embodiments, provide network services to other nodes (not shown), or to any of access points 102, 104, and 106. Wireless network 100 may be any type of network that allows a node to access network services using a wireless link. For example, in some embodiments of the present invention, wireless network 100 represents a cellular telephone network, and in other embodiments, wireless network 100 represents a wireless local area network (WLAN) or wireless wide area network (WWAN). hi still further embodiments, network 100 is a hybrid system that provides a combination of different services to network nodes and access points. Media 116 may be any type of signal transmission media capable of providing a data communication path between server 122 and access points 102, 104, and 106. Examples include, but are not limited to: wires, fiber optic cables, and wireless links. Wireless network node 120 may be any type of network node capable of accessing network services using a wireless link. For example, node 120 may be a cellular telephone, a computer, a personal digital assistant (PDA), or any other type of device that may access a network using a wireless link. In some embodiments, node 120 may be a combination cellular phone and computer that provides both wireless data and voice services. In other embodiments, node 120 maybe an asset tag that is attached to, or otherwise associated with, an asset that is tracked by network 100. In general, nodes and access points are network elements that may provide network services, receive network services, or both. For example, in cellular network embodiments, access points 102, 104, and 106 may be cellular base stations that provide network services and node 120 may be a cellular telephone that primarily receives network services. Also for example, in wireless LAN embodiments, access points 102, 104, and 106, and node 120 may be computers that provide and receive network services. The remainder of this description describes many different embodiments of the present invention, with an emphasis on wireless LAN embodiments. The emphasis on wireless LAN embodiments is provided for clarity, and one of ordinary skill in the art will understand that embodiments of the present invention are not limited to wireless LANs.
In operation, network 100 provides the ability to determine the location of wireless network nodes. Throughout this description, this ability is referred to as "location determination." Networks that provide location determination are referred to herein as "location-aware" networks. Network 100 is a location-aware network that provides location determination of node 120 through the use of wireless links 132, 134, and 136.
Wireless links 132, 134, and 136 provide communication paths between node 120 and access points 102, 104, and 106. The various access points send and receive wireless signals to and from node 120 on the wireless links, and also send and receive signals to and from server 122 using media 116. In some embodiments, wireless links 132, 134, and 136 utilize a pulse-based radio frequency (RF) protocol to provide communications between node 120 and access points 102, 104, and 106. In these embodiments, short RF pulses are transmitted by node 120 and received by access points 102, 104, and 106. In other embodiments, the wireless links utilize baseband modulated protocols in which the desired data to be transmitted is superimposed by various means on a sinusoidal carrier signal. One example of a suitable pulse-based protocol is the emerging ultra-wideband (UWB) protocol in which low power, short duration, pulses are transmitted over the wireless link. Another example of a suitable pulse-based protocol is described in US Patent 6,031,862, issued to Fullerton et al. on Feb. 29, 2000. In other embodiments, wireless links 132, 134, and 136 utilize a data modulated sinusoidal carrier. Any type of wireless protocol may be utilized for wireless links 132, 134, and 136.
Any type of information may be contained within the signals received from node 120. For example, the signals may contain voice information or data information, in any analog or digital format suitable for requesting or providing network services. When receiving wireless signals from node 120, the various access points may also gather information describing attributes of the wireless signals. For example, in pulse- based embodiments, the access points may gather pulse time-of-arrival information as well as angle-of-arrival, pulse amplitude, pulse duration, and rise/fall time information. In sinusoidal carrier embodiments, the access points may gather center frequency, angle-of- arrival, amplitude, phase offset, or other information. In general, information gathered describing attributes of the received signals may include any type of information, including information suitable to support location determination. For example, pulse time- of-arrival information, angle-of-arrival information, or both, may be used to determine the location of network node 120 relative to the locations of the access points. Also for example, phase offset of a received sinusoidal carrier signal may also be used in support of location determination.
Attributes of received wireless signals may be transmitted from the various access . points to server 122. These attributes may then be used by server 122 to determine the location of node 120. For example, in pulse-based embodiments, pulse time-of-arrival and optionally pulse angle-of-arrival information gathered by the access points may be used to resolve the position of node 120 relative to the locations of the access points that measure the time-of-arrival and optionally angle-of-arrival. Also for example, in sinusoidal carrier embodiments, phase offsets may be used to resolve the location of node 120.
Figure 1 shows three access points. In embodiments with three access points capable of receiving signals from node 120, the location of node 120 may be determined in two dimensions. Some embodiments have more than three access points. In embodiments with four or more access points capable of receiving signals from node 120, the location of node 120 may be determined in three dimensions.
Figure 2 shows a diagram of a wireless network with logical boundaries. Wireless network 200 includes network access points (NAPs) 202, 203, 204, 205, 206, 207, 208, and 209, sometimes referred to herein as NAPs 202-209. NAPs 202-209 are coupled to a server (not shown) such as server 122 (Figure 1). Node 240 is a network node that connects to the network by communicating with one or more of NAPs 202-209. This connection is established when the network node "associates" with a given access point through which it intends to pass data to the rest of the network. During the process of associating to an access point, network nodes typically perform an "authentication" action prior to association. The purpose of authentication is to establish the identity of nodes wishing to connect to the network. An authenticated node is a node that is allowed to connect to the network and receive network services. Network node 240 communicates with network access points using wireless signals. For example, network node 240 communicates with network access points 202, 204, and 208 using wireless signals on wireless links 242, 244, and 246, respectively. In some embodiments, network node 240 communicates with the network using only one of the wireless links shown, but multiple network access points receive the signals transmitted by network node 240. The location of node 240 is determined by wireless network 200 as described above with reference to Figure 1.
Also shown in Figure 2 is logical network boundary 220. When node 240 is inside logical boundary 220, network 200 acknowledges location-based authentication of node . 240, and allows node 240 to access the network using the network access points provided that the network does not require further levels of authentication. When node 240 is " outside logical boundary 220, network 200 refuses location-based authentication, and does not allow node 240 to access the network. Logical boundary 220 may correspond to the outline of a building, but this is not necessary. For example, logical boundary 220 may correspond to an area within a single building, an area encompassing multiple buildings, or an area outside of any buildings. Figure 2 shows a single logical network boundary, but this is not a limitation. For example, in some embodiments, multiple logical network boundaries exist. They may overlap such that there is an intersecting area, or they may not overlap such that there are multiple discrete areas from which a network node may connect to the network.
When network node 240 attempts to connect to network 200, network node 240 sends a location-based network authentication request to one of network access points 202, 204, and 208. The network access points receiving the authentication request forward the request to a server. Network 200 determines the location of network node 240, and authenticates the node based on its location relative to logical boundary 220. hi the case of network node 240, network 200 determines that the node is within logical boundary 220, and the location-based authentication request is granted.
Also shown in Figure 2 is network node 250. Network node 250 is outside logical boundary 220. When connecting to the network, network node 250 sends a location-based network authentication request to network access point 208 using a wireless signal on wireless link 252. The wireless signal is also received by network access points 207 and 209 on wireless links 254 and 246, respectively. The network determines the location of network node 250, and determines that network node 250 is outside logical boundary 220. Based on the location of network node 250, the location-based authentication request is denied and network node 250 is not granted access to network 200.
Location-based authentication is an example of a "link-layer" network authentication scheme. Some embodiments possess additional link-layer authentication schemes, such as "open system" and "shared key" authentication. Open system authentication is a null scheme that authenticates all traffic at the link-layer. Shared key authentication is another example of a link-layer authentication scheme wherein an authorized node shares a common secret key code with the network.
Some embodiments of the network utilize other authentication schemes beyond . link-layer authentication. Examples of other authentication schemes include operating system (OS) level authentication as provided by network operating systems that maintain " individual user level and/or system resource level passwords.
Also shown in Figure 2 are tracked asset 232 and logical asset boundary 230. Tracked asset 232 includes asset tag 233 associated therewith. Asset tag 233 includes a transmitter compatible with the network access points shown in Figure 2. In some embodiments, asset tag 233 includes a transmitter that transmits pulses that are received by three or more of NAPs 202-209. The time-of-arrival and optionally angle-of-arrival of the pulses is determined by the network access points, and the network server (not shown) may determine the location of tracked asset 232. Logical boundary 230 is a boundary against which the location of tracked asset 232 is compared. For example, logical boundary 230 may correspond to a laboratory, the outline of a retail store, or an intensive care unit in a hospital within which certain tracked assets are kept. When a particular tracked asset is detected outside logical boundary 230, network 200 may take appropriate action, such as raising an alert readable by security personnel.
Logical boundary 230 may correspond to a physical boundary, such as a building, a room within a building, or a courtyard on a campus, but this is not necessary. Figure 2 shows one logical asset boundary 230. hi some embodiments, many logical asset boundaries exist. For example, in a hospital, many different types of tracked assets may have asset tags, and each of these different types of assets may have a different logical asset boundary.
Figure 3 shows a diagram of a network access point device suitable for use at the network access points shown in Figures 1 and 2. Network access point device 300 includes transmitter 302, receiver 304, time-of-arrival detector 306, angle-of-arrival detector 214, processor 308, memory 312, and transceiver 310. Transceiver 310 communicates with a server (not shown) using media 116. Transceiver 310 also communicates with processor 308. Transmitter 302 and receiver 304 both communicate with processor 308 and antenna 320.
Antenna 320 receives wireless signals from network nodes and asset tags on wireless link 330. h some embodiments, wireless signals on wireless link 330 include electromagnetic pulses as described above with reference to Figure 1. In these embodiments, receiver 304 receives the pulses, and time-of-arrival detector 306 detects the . arrival time of the pulse. Time-of-arrival information is one of many possible attributes of a wireless signal that may be measured by receiver 304. For example, in some " embodiments, angle-of-arrival detector 314 detects the angle from which the pulse arrived as an attribute of the wireless signal. Some embodiments measure both time-of-arrival and angle-of-arrival. Processor 308 receives information describing the wireless signal from receiver 304 and provides it to a network server using transceiver 310.
Time-of-arrival detector 306 can be implemented in a number of different ways. In one embodiment, the function of the time-of-arrival detector is a separate module within the network access point device 300. In other embodiments, time-of-arrival detector 306 is integrated into receiver 304. In yet other embodiments, time-of-arrival detector 306 utilizes processing capabilities of processor 308 to perform its function. Angle-of-arrival detector314 can also be implemented in a number of different ways. In some embodiments, angle-of-arrival detector 314 is a circuit that receives signals from a phased-array antennal to measure the angle from which the signals are received. In these embodiments, antenna 320 represents a phased-array antenna. Many other mechanisms can be used to measure the angle-of-arrival of the wireless signal.
Processor 308 may be any type of processor suitable to perform actions to support the operation of network access point device 300. For example, processor 308 may be a microprocessor, a microcontroller, or the like. Also for example, processor 308 may be a hardware controller or a collection of hardware controllers that perform specific tasks. Memory 312 represents an article that includes a machine-accessible medium. For example, memory 312 may represent any one or more of the following: a hard disk, a floppy disk, random access memory (RAM), read only memory (ROM), flash memory, CDROM, or any other type of article that includes a medium readable by a machine. Memory 312 may store instructions for performing the execution of the various method embodiments of the present invention. Memory 312 may also include data describing the current state of network access point device 300 and the entire network.
When multiple network access point devices 300 measure attributes of a single electromagnetic pulse, a network server may utilize this information to resolve the location of the network node from which the pulse originated. In some embodiments, multiple electromagnetic pulses are received by receiver 304. The multiple electromagnetic pulses may represent any type of communication from a network node. For example, a group of pulses may represent a network authentication request from a network node. Also for . example, a group of pulses may represent an identification number or serial number from an asset tag. Receiver 304 derives information from groups of pulses, as well as from " attributes describing the pulses. Processor 308 receives from receiver 304 information describing both groups of pulses as well as attributes of individual pulses. For example, processor 308 may receive an authentication request from receiver 304, as well as receiving time-of-arrival and angle-of-arrival information of pulses contained within the authentication request.
Figure 4 shows a diagram of a network server suitable for use in a wireless network such as network 100 (Figure 1) or network 200 (Figure 2). Server 400 includes processor 402, memory 404, and transceiver 406. Transceiver 406 is coupled to media 116 at port 410. As described above with reference to Figure 1 , media 116 couples the network server with any number of network access point devices such as network access point device 300 (Figure 3). Transceiver 406 receives information from network access point devices on media 116. In some embodiments, wireless signal attributes are received from multiple network access point devices, and processor 402 determines the location of a transmitter from which the wireless signals originated. Server 400 may be a personal computer (PC), server, mainframe, handheld device, portable computer, or any other system that may perform the operations described herein.
Memory 404 represents an article that includes a machine-accessible medium. For example, memory 404 may represent any one or more of the following: a hard disk, a floppy disk, random access memory (RAM), read only memory (ROM), flash memory, CDROM, or any other type of article that includes a medium readable by a machine. Memory 404 may store instructions for performing the execution of the various method embodiments of the present invention. Memory 404 may also include data describing the current state of server 400 and the entire network. For example, memory 404 may include data describing logical boundaries, as well as the location of network nodes and asset tags. One possible set of data is shown in Figure 5.
Figure 5 shows data structures suitable for use in various embodiments of the present invention. Data structure 500 includes logical boundary database 510 and asset database 520. Logical boundary database 510 includes data 502 describing one or more logical network boundaries, and data 504 describing one or more logical asset boundaries. Data 502 describe a logical network boundary such as logical network boundary 220 (Figure 2). The logical network boundary may be described by data 502 in any of many . formats. For example, a series of line segments may be specified by end points, or vectors may be described by end points and direction. Similarly, data 504 may describe logical " asset boundaries in any suitable format. For example, data 504 may include end points, vectors, or any shape.
Asset database 520 includes records describing asset tags and tracked assets. For example, an asset tag serial number may be maintained along with attributes of the tracked asset and the logical asset boundary to which the asset is assigned. The attributes may include any information that is useful. For example, in embodiments that track assets in a retail store environment, the attributes may include price and description data. Also for example, in embodiments that track assets in a laboratory, the attributes may include a description of the tracked asset and the identification of a person to be notified in the event that the asset leaves the logical asset boundary.
In operation, a network server may track a location of an asset having a serial number, and compare the location of the asset with the logical asset boundary specified in the asset database. For example, an asset tag may transmit a unique serial number that is received by at least one network access point device and sent to the server. The server may retrieve one or more appropriate records from the asset database using the serial number of the tracked asset. The location of the tracked asset may be compared against the logical asset boundary specified in the asset database. If the tracked asset is outside the boundary, an alert may be raised. As used herein, the term "raise an alert" refers to any appropriate action to be taken. For example, in some embodiments, raising an alert may include sending an email message to a responsible party, hi other embodiments, raising an alert may include sounding a siren and turning on a flashing red light. The specific course of action to be taken when an alert is raised may be predefined or may also be dependent upon information stored in the attributes field of the appropriate asset database record.
As shown in Figure 5, data structure 500 includes data in support of logical asset boundaries and logical network boundaries. Some embodiments include only logical asset boundaries, and other embodiments include only logical network boundaries. For example, in some embodiments the network is installed in an environment without tracked assets. In these embodiments, logical asset boundaries do not necessarily exist. In other embodiments, the network is installed in an environment that does not include network nodes, but does include tracked assets, h these embodiments, logical network boundaries . do not necessarily exist.
Figures 6 and 7 show flowcharts in accordance with various embodiments of the ' present invention. In some embodiments, methods 600 and 700 are performed by a server such as server 400 (Figure 4). In other embodiments, the methods are distributed across a server and network access point devices. The various actions in methods 600 and 700 may be performed in the order presented, or may be performed in a different order.
Further, in some embodiments, some actions listed in Figures 6 and 7 are omitted from methods 600 and 700, respectively.
Referring now to Figure 6, a flowchart of a method for location-based network authentication is shown. At 610, a wireless signal comprising a series of electromagnetic pulses is received from a node. The node corresponds to a network node, such as those shown in the previous figures, that is attempting to access the network. The network node may be attempting to authenticate to the network using a single network access point, but the wireless signal may be received by multiple network access points devices. At 620, a network authentication request is received from the node. In some embodiments, the network authentication request is received by a single network access point device and forwarded to a network server. In other embodiments, the network authentication request is received by multiple network access point devices, all of which forward the request to the network server.
The remaining description of Figures 6 and 7 refers to the use of time-of-arrival information. Each reference to "time-of-arrival" is equally applicable to "angle-of-arrival" information. For example, when time-of-arrival information is transmitted, angle-of- arrival information may also be transmitted. Likewise, when time-of-arrival information is used to resolve the location of a node, angle-of-arrival information may also be used to resolve the location of a node.
At 630, time-of-arrival information is received from a plurality of network access points. The time-of-arrival information received may describe multiple electromagnetic pulses from the network node, or may describe a single electromagnetic pulse. At 640, the location of the node is resolved from the time-of-arrival information. At 650, a determination is made whether the location of the node satisfies a criteria. This may correspond to any location-based criteria. For example, the criteria may include one or more logical network boundaries. At 660, authentication is provided if the location of the node satisfies the criteria.
Figure 7 shows a flowchart of a method for operating a network that includes - location-based authentication and tracked assets. At 710, time-of-arrival information is received from a plurality of network access points. The time-of-arrival information describes a pulse-based wireless signal originating from the node. At 720, a network authentication request originating from the node is received. At 730, a determination is made whether the node is within a logical network boundary, and at 740, authentication is refused if the node is not within the logical network boundary.
At 750, time-of-arrival information is received from a plurality of network access points. This time-of-arrival information describes a pulse-based wireless signal originating from an asset tag. At 760, a determination is made whether the asset tag is within a logical asset boundary. This may include accessing a database such as database 500 (Figure 5). At 770, an alert is raised if the asset tag is not within the logical asset boundary.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

Claims

What is claimed is:
1. A method comprising: receiving a network authentication request from a node; determining if a location of the node satisfies a criteria; and providing authentication if the location of the node satisfies the criteria.
2. The method of claim 1 wherein receiving a network authentication request comprises receiving a wireless signal from the node.
3. The method of claim 2 wherein receiving the wireless signal comprises receiving a series of electromagnetic pulses.
4. The method of claim 1 further comprising determining the location of the node.
5. The method of claim 4 wherein determining the location of the node comprises: receiving time-of-arrival information from a plurality of network access point devices; and resolving the location of the node from the time-of-arrival information.
6. The method of claim 5 wherein receiving a network authentication request comprises receiving a network authentication request from one of the plurality of network access point devices.
7. The method of claim 4 wherein determining the location of the node comprises: receiving angle-of-arrival information from a plurality of network access point devices; and resolving the location of the node from the angle-of-arrival information.
8. The method of claim 7 wherein receiving a network authentication request comprises receiving a network authentication request from one of the plurality of network access point devices.
9. The method of claim 1 wherein determining if the location of the node satisfies a criteria comprises comparing the location of the node to a logical network boundary.
10. The method of claim 9 further comprising determining the location of the node using time-of-arrival information from a plurality of network access point devices.
11. The method of claim 9 further comprising determining the location of the node using angle-of-arrival information from a plurality of network access point devices.
12. A method comprising: receiving time-of-arrival information describing a pulse-based wireless signal originating from a node; receiving a network location-based authentication request originating from the - node; determining if the node is within a logical network boundary; and refusing location-based authentication if the node is not within the logical network boundary.
13. The method of claim 12 wherein receiving time-of-arrival information comprises receiving time-of-arrival information from a plurality of network access point devices.
14. the method of claim 13 further comprising receiving angle-of-arrival information from the plurality of network access point devices.
15. The method of claim 13 wherein receiving a network authentication request comprises receiving the network location-based authentication request from one of the plurality of network access point devices.
16. The method of claim 12 further comprising: receiving time-of-arrival information describing a pulse-based wireless signal originating from an asset tag; determining if the asset tag is within a logical asset boundary; and raising an alert if the asset tag is not within the logical asset boundary.
17. The method of claim 16 further comprising receiving angle-of-arrival information describing the pulse-based wireless signal originating from the asset tag.
18. The method of claim 16 wherein receiving time-of-arrival information describing a pulse-based wireless signal originating from an asset tag comprises receiving time-of- arrival information from a plurality of network access point devices.
19. An article comprising a machine-accessible media having associated data, wherein the data, when accessed, results in a machine performing: receiving an electromagnetic pulse transmitted from a transmitter in a network; determining a location of the transmitter from an attribute describing the - electromagnetic pulse; and comparing the location of the transmitter to a logical boundary.
20. The article of claim 19 wherein receiving an electromagnetic pulse comprises receiving an electromagnetic pulse from an asset tag associated with a tracked asset.
21. The article of claim 20 further comprising accessing a database that includes information relating to the tracked asset.
22. The article of claim 21 further comprising raising an alert when the tracked asset is outside the logical boundary.
23. The article of claim 20 further comprising raising an alert when the tracked asset is outside the logical boundary.
24. The article of claim 19 wherein receiving an electromagnetic pulse comprises receiving an electromagnetic pulse from a network node.
25. The article of claim 24 further comprising conditionally authenticating the network node based on the location of the network node relative to the logical boundary.
26. A network comprising: a plurality of network access point devices, each of the plurality of network access point devices including a receiver to receive wireless signals from a network node, and including a transmitter to transmit attributes of the wireless signals; and a server coupled to the plurality of network access point devices to receive the attributes of the wireless signals, to determine a location of the network node, and to provide location-based authentication the network node based on the location relative to one or more logical boundaries.
27. The network of claim 26 wherein each of the plurality of network access point devices is configured to receive pulsed wireless signals from the network node.
28. The network of claim 27 wherein each of the plurality of network access point - devices further include time-of-arrival detection circuitry to detect time-of-arrival of pulses as one of the attributes of the wireless signals.
29. The network of claim 28 wherein each of the plurality of network access point devices further include angle-of-arrival detection circuitry to detect angle-of-arrival of pulses as another of the attributes of the wireless signals.
30. The network of claim 26 wherein each of the plurality of network access point devices is configured to receive an authentication request comprising a series of electromagnetic pulses, and to measure a time-of-arrival of the electromagnetic pulses as one of the attributes of the wireless signals.
31. The network of claim 30 wherein each of the plurality of network access point devices is further configured to measure an angle-of-arrival of the electromagnetic pulses as another of the attributes of the wireless signals.
32. The network of claim 30 wherein the server is configured to receive the time-of- arrival from each of the plurality of network access point devices and resolve the location of the network node.
33. A network server comprising at least one port to couple the network server to a plurality of wireless network access point devices, the network server being configured to receive wireless signal attributes from the plurality of wireless network access point devices, to determine a location of a transmitter from the wireless signal attributes, and to conditionally perform an action based on the location of the transmitter.
34. The network server of claim 33 wherein the network server is further configured to receive time-of-arrival information from the wireless network access point devices.
35. The network server of claim 34 wherein the network server is further configured to receive angle-of-arrival information from the wireless network access point devices.
36. The network server of claim 34 wherein the network server is configured to
- provide a location-based authentication service to network nodes based on the location of the transmitter.
37. The network server of claim 33 wherein the network server is configured to determine if the transmitter is associated with a tracked asset, and to raise an alert if the asset is outside a logical boundary.
PCT/US2003/019095 2002-06-24 2003-06-19 Methods and systems to determine whether a wireless device is within a geographical area WO2004002113A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2003247540A AU2003247540A1 (en) 2002-06-24 2003-06-19 Methods and systems to determine whether a wireless device is within a geographical area
EP03761092A EP1535447A1 (en) 2002-06-24 2003-06-19 Methods and systems to determine whether a wireless device is within a geographical area

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/179,941 US7346358B2 (en) 2002-06-24 2002-06-24 Logical boundaries in communications networks
US10/179,941 2002-06-24

Publications (1)

Publication Number Publication Date
WO2004002113A1 true WO2004002113A1 (en) 2003-12-31

Family

ID=29999147

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/019095 WO2004002113A1 (en) 2002-06-24 2003-06-19 Methods and systems to determine whether a wireless device is within a geographical area

Country Status (5)

Country Link
US (1) US7346358B2 (en)
EP (1) EP1535447A1 (en)
CN (1) CN1663220A (en)
AU (1) AU2003247540A1 (en)
WO (1) WO2004002113A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004012424A2 (en) 2002-07-29 2004-02-05 Meshnetworks, Inc. A system and method for determining physical location of a node in a wireless network during an authentication check of the node
EP1617624A1 (en) * 2004-07-15 2006-01-18 Avaya Technology Corp. Peer-to-peer neighbor detection for proximity-based command execution
EP1624416A3 (en) * 2004-07-15 2006-03-15 Avaya Technology Corp. Authorising the execution of a command from a wireless terminal based on the presence or absence of nearby terminals
CN1332281C (en) * 2004-03-24 2007-08-15 美国博通公司 Global positioning system (gps) based secure access

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4220189B2 (en) * 2002-07-15 2009-02-04 株式会社日立製作所 Information network system control method and information network system
US7203497B2 (en) * 2003-06-06 2007-04-10 Meshnetworks, Inc. System and method for accurately computing the position of wireless devices inside high-rise buildings
US7221949B2 (en) * 2005-02-28 2007-05-22 Research In Motion Limited Method and system for enhanced security using location-based wireless authentication
US20070087763A1 (en) * 2005-10-18 2007-04-19 Honeywell International Inc. Location aware wireless security
US8301115B1 (en) * 2006-03-08 2012-10-30 Alcatel Lucent Method for inverse port-based authentication
US8051466B2 (en) * 2007-09-28 2011-11-01 Symbol Technologies, Inc. RFID based network admission control
US8527415B2 (en) * 2007-12-27 2013-09-03 Mastercard International, Inc. Techniques for conducting financial transactions using mobile communication devices
US20110196714A1 (en) * 2010-02-09 2011-08-11 Avaya, Inc. Method and apparatus for overriding apparent geo-pod attributes
US7933836B2 (en) * 2008-09-30 2011-04-26 Avaya Inc. Proxy-based, transaction authorization system
US8732859B2 (en) * 2008-10-03 2014-05-20 At&T Intellectual Property I, L.P. Apparatus and method for monitoring network equipment
US8406783B2 (en) 2008-10-10 2013-03-26 Qualcomm Incorporated Geographical boundary based tracking
US8602875B2 (en) 2009-10-17 2013-12-10 Nguyen Gaming Llc Preserving game state data for asynchronous persistent group bonus games
US8864586B2 (en) * 2009-11-12 2014-10-21 Nguyen Gaming Llc Gaming systems including viral gaming events
US9626826B2 (en) 2010-06-10 2017-04-18 Nguyen Gaming Llc Location-based real-time casino data
US20210005047A1 (en) 2009-11-12 2021-01-07 Nguyen Gaming Llc Gaming system supporting data distribution to gaming devices
US8597108B2 (en) 2009-11-16 2013-12-03 Nguyen Gaming Llc Asynchronous persistent group bonus game
US8696470B2 (en) 2010-04-09 2014-04-15 Nguyen Gaming Llc Spontaneous player preferences
US9486704B2 (en) 2010-11-14 2016-11-08 Nguyen Gaming Llc Social gaming
US9564018B2 (en) 2010-11-14 2017-02-07 Nguyen Gaming Llc Temporary grant of real-time bonus feature
US9595161B2 (en) 2010-11-14 2017-03-14 Nguyen Gaming Llc Social gaming
US9235952B2 (en) 2010-11-14 2016-01-12 Nguyen Gaming Llc Peripheral management device for virtual game interaction
US10052551B2 (en) 2010-11-14 2018-08-21 Nguyen Gaming Llc Multi-functional peripheral device
US20180053374A9 (en) 2010-11-14 2018-02-22 Binh T. Nguyen Multi-Functional Peripheral Device
GB2489198B (en) * 2011-03-04 2013-02-20 Hsbc Holdings Plc Tracking of physical locations
US9672686B2 (en) 2011-10-03 2017-06-06 Nguyen Gaming Llc Electronic fund transfer for mobile gaming
US9630096B2 (en) 2011-10-03 2017-04-25 Nguyen Gaming Llc Control of mobile game play on a mobile vessel
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9325203B2 (en) 2012-07-24 2016-04-26 Binh Nguyen Optimized power consumption in a gaming device
US10176666B2 (en) 2012-10-01 2019-01-08 Nguyen Gaming Llc Viral benefit distribution using mobile devices
GB2507105A (en) 2012-10-19 2014-04-23 Ibm Consumer location-based host service placement
US9466198B2 (en) 2013-02-22 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10158213B2 (en) 2013-02-22 2018-12-18 Milwaukee Electric Tool Corporation Worksite power distribution box
US9483901B2 (en) 2013-03-15 2016-11-01 Nguyen Gaming Llc Gaming device docking station
US9814970B2 (en) 2013-03-15 2017-11-14 Nguyen Gaming Llc Authentication of mobile servers
US10421010B2 (en) 2013-03-15 2019-09-24 Nguyen Gaming Llc Determination of advertisement based on player physiology
US9600976B2 (en) 2013-03-15 2017-03-21 Nguyen Gaming Llc Adaptive mobile device gaming system
US11398131B2 (en) 2013-03-15 2022-07-26 Aristocrat Technologies, Inc. (ATI) Method and system for localized mobile gaming
GB2512081A (en) * 2013-03-19 2014-09-24 Vodafone Ip Licensing Ltd WLAN authentication restriction
US9622045B2 (en) * 2014-03-28 2017-04-11 Intel IP Corporation Managing location profiles for personal area maps
DE102015211825A1 (en) * 2015-06-25 2016-12-29 Siemens Aktiengesellschaft Method and system for checking the authenticity of received data
US10916090B2 (en) 2016-08-23 2021-02-09 Igt System and method for transferring funds from a financial institution device to a cashless wagering account accessible via a mobile device
CN106792552B (en) * 2016-11-24 2020-03-31 南京邮电大学 Wireless network self-adaptive authorization access method
US10440570B2 (en) * 2016-12-21 2019-10-08 Silicon Laboratories Inc. Systems and methods for initial authentication of wireless communication
US11386747B2 (en) 2017-10-23 2022-07-12 Aristocrat Technologies, Inc. (ATI) Gaming monetary instrument tracking system
US11238148B2 (en) * 2019-02-12 2022-02-01 Cisco Technology, Inc. Location-based, context-aware challenge-response authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5461390A (en) * 1994-05-27 1995-10-24 At&T Ipm Corp. Locator device useful for house arrest and stalker detection
EP0933961A2 (en) * 1997-11-06 1999-08-04 Nokia Mobile Phones Ltd. A method and arrangement for locating a mobile station
WO1999055102A1 (en) * 1998-04-22 1999-10-28 Netline Communications Technologies (Nct) Ltd. Method and system for providing cellular communications services
US6154172A (en) * 1998-03-31 2000-11-28 Piccionelli; Gregory A. System and process for limiting distribution of information on a communication network based on geographic location
US20010030607A1 (en) * 1999-12-23 2001-10-18 Osborne Harold G. Child safety device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5677927A (en) 1994-09-20 1997-10-14 Pulson Communications Corporation Ultrawide-band communication system and method
US20020059230A1 (en) * 2000-10-13 2002-05-16 Capstone Technology, Inc. Asset control system and method
EP1336310B1 (en) * 2000-11-14 2010-02-10 Symbol Technologies, Inc. Methods and apparatus for identifying asset location in mobile communication networks
US20030036374A1 (en) * 2001-06-04 2003-02-20 Time Domain Corporation Wireless local area network using impulse radio technology to improve communications between mobile nodes and access points
AU2002335697A1 (en) * 2001-09-05 2003-03-18 Newbury Networks, Inc. Position detection and location tracking in a wireless network
US20040019786A1 (en) * 2001-12-14 2004-01-29 Zorn Glen W. Lightweight extensible authentication protocol password preprocessing
US7508799B2 (en) * 2002-01-29 2009-03-24 Arch Wireless Operating Company, Inc. Managing wireless network data
US7092943B2 (en) * 2002-03-01 2006-08-15 Enterasys Networks, Inc. Location based data
US20040054774A1 (en) * 2002-05-04 2004-03-18 Instant802 Networks Inc. Using wireless network access points for monitoring radio spectrum traffic and interference

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5461390A (en) * 1994-05-27 1995-10-24 At&T Ipm Corp. Locator device useful for house arrest and stalker detection
EP0933961A2 (en) * 1997-11-06 1999-08-04 Nokia Mobile Phones Ltd. A method and arrangement for locating a mobile station
US6154172A (en) * 1998-03-31 2000-11-28 Piccionelli; Gregory A. System and process for limiting distribution of information on a communication network based on geographic location
WO1999055102A1 (en) * 1998-04-22 1999-10-28 Netline Communications Technologies (Nct) Ltd. Method and system for providing cellular communications services
US20010030607A1 (en) * 1999-12-23 2001-10-18 Osborne Harold G. Child safety device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DENNING D E ET AL: "Location-based authentication: grounding cyberspace for better security", COMPUTER FRAUD AND SECURITY, OXFORD, GB, February 1996 (1996-02-01), pages 12 - 16, XP002117683, ISSN: 1361-3723 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004012424A2 (en) 2002-07-29 2004-02-05 Meshnetworks, Inc. A system and method for determining physical location of a node in a wireless network during an authentication check of the node
EP1525764A2 (en) * 2002-07-29 2005-04-27 Meshnetworks, Inc. A system and method for determining physical location of a node in a wireless network during an authentication check of the node
EP1525764A4 (en) * 2002-07-29 2006-08-16 Meshnetworks Inc A system and method for determining physical location of a node in a wireless network during an authentication check of the node
US8325653B2 (en) 2002-07-29 2012-12-04 Meshnetworks, Inc. System and method for restricting network access to one or more nodes in a wireless communications network
CN1332281C (en) * 2004-03-24 2007-08-15 美国博通公司 Global positioning system (gps) based secure access
EP1617624A1 (en) * 2004-07-15 2006-01-18 Avaya Technology Corp. Peer-to-peer neighbor detection for proximity-based command execution
EP1624416A3 (en) * 2004-07-15 2006-03-15 Avaya Technology Corp. Authorising the execution of a command from a wireless terminal based on the presence or absence of nearby terminals
US8050698B2 (en) 2004-07-15 2011-11-01 Avaya Inc. Peer-to-peer neighbor detection for proximity-based command execution
US8571541B2 (en) 2004-07-15 2013-10-29 Avaya Inc. Proximity-based authorization
US9031534B2 (en) 2004-07-15 2015-05-12 Avaya Inc. Proximity-based authorization

Also Published As

Publication number Publication date
US7346358B2 (en) 2008-03-18
CN1663220A (en) 2005-08-31
AU2003247540A1 (en) 2004-01-06
EP1535447A1 (en) 2005-06-01
US20040203862A1 (en) 2004-10-14

Similar Documents

Publication Publication Date Title
US7346358B2 (en) Logical boundaries in communications networks
TWI345427B (en) System and method for determining location of rogue wireless access point
US7068999B2 (en) System and method for detection of a rogue wireless access point in a wireless communication network
EP1864532B1 (en) Location based authentication
US7827610B2 (en) Wireless LAN intrusion detection based on location
KR100734733B1 (en) Monitoring changeable locations of client devices in wireless networks
EP1488333B1 (en) Location aware data network
US6614350B1 (en) Method and system for effecting a security system upon multiple portable information devices
US20060143292A1 (en) Location-based network access
US8078160B2 (en) Wireless network notification, messaging and access device
US20030232598A1 (en) Method and apparatus for intrusion management in a wireless network using physical location determination
JP2007527658A (en) Method and system for monitoring selected airspace associated with a local area network of computer equipment
WO2004075583A1 (en) Reduction of electrosmog in wireless local networks
US20080068130A1 (en) Methods and apparatus for location-dependent disabling of mobile devices
JP2006279438A (en) Illegal access detecting method and device
US20090037979A1 (en) Method and System for Recovering Authentication in a Network
US20070091858A1 (en) Method and apparatus for tracking unauthorized nodes within a network
CN110839236B (en) Wireless internet access management method based on physical identity authentication
Hasan et al. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures
Singh et al. A Novel Approach Towards illegitimate Access Point Discovery To Prevent Session Hijacking
WO2003030455A1 (en) Improvements in and relating to communication systems and methods
Chen et al. Overview of Wireless Localization
JP2004363858A (en) Radio communication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 20038147467

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2003761092

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003761092

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP